5 juin 2023 | International, C4ISR

US Space Force taps L3Harris to design missile-tracking sensor

According to the Space Force, selecting L3Harris to design a third sensor reduces program risk and gives the service more options.

https://www.c4isrnet.com/battlefield-tech/space/2023/06/05/us-space-force-taps-l3harris-to-design-missile-tracking-sensor/

Sur le même sujet

  • Flying NATO RQ-4D Phoenix remotely piloted aircraft

    30 janvier 2023 | International, Aérospatial

    Flying NATO RQ-4D Phoenix remotely piloted aircraft

    With a decision pending on the Royal Canadian Air Force’s Remotely Piloted Aircraft System project, a Canadian team is flying NATO remotely piloted missions across the Atlantic.

  • National Reconnaissance Office launches “revolutionary” satellites from Virginia

    16 juillet 2020 | International, Aérospatial

    National Reconnaissance Office launches “revolutionary” satellites from Virginia

    Nathan Strout The National Reconnaissance Office successfully launched four classified payloads into orbit July 15 from NASA's Wallops Flight Facility — the agency's first dedicated launch from the Virginia facility. NRO is in charge of acquiring, launching and operating the nation's intelligence satellites, and while the agency does not typically reveal the details or purpose of its classified satellites, the agency's director noted that the four payloads will demonstrate revolutionary capabilities. “NROL-129 represents a collaboration between the NRO and our industry partners to design, build, launch and operate a system of satellites that will demonstrate revolutionary capabilities of value to the nation and our allies,” said NRO Director Chris Scolese. “Despite facing challenges in 2020, we have found new and better ways to collaborate with our partners from a distance, relentlessly pursuing our mission and denying sanctuary to our adversaries.” The four NRO-built payloads — dubbed NROL-129 — were launched aboard a Northrop Grumman Minotaur IV rocket at 9:46 a.m. ET. This was NRO's first launch with a Northrop Grumman Minotaur IV, a rocket capable of delivering payloads of up to 3,814 lbs into low Earth orbit. The first three stages of the four stage, 78-foot tall rocket utilize solid rocket motors taken from decommissioned Peacekeeper ICBMs. The launch was acquired under the U.S. Air Force's Orbital/Suborbital Program-3, a contract mechanism built to take advantage of the growing commercial small launch sector. This was NRO's third launch of 2020 and its first to take place on U.S. soil. The previous two launches, taking place respectively in January and June, were launched aboard Rocket Lab Electron rockets from the company's New Zealand facility. The agency's next mission, NROL-44, is set to launch in August from Cape Canaveral Air Force Station, Florida. https://www.c4isrnet.com/battlefield-tech/space/2020/07/15/national-reconnaissance-office-launches-revolutionary-satellites-from-virginia/

  • Pentagon invites researchers to hack the Marine Corps

    14 août 2018 | International, C4ISR

    Pentagon invites researchers to hack the Marine Corps

    By: Jessie Bur The Department of Defense kicked off its sixth bug bounty program Aug.12 with Hack the Marine Corps, a challenge focusing on the Corps' public-facing websites and services. “Hack the Marine Corps allows us to leverage the talents of the global ethical hacker community to take an honest, hard look at our current cybersecurity posture," said Maj.Gen. Matthew Glavy, the head of the U.S. Marine Corps Forces Cyberspace Command, in a news release. “Our Marines need to operate against the best. What we learn from this program will assist the Marine Corps in improving our war-fighting platform, the Marine Corps Enterprise Network. Working with the ethical hacker community provides us with a large return on investment to identify and mitigate current critical vulnerabilities, reduce attack surfaces and minimize future vulnerabilities. It will make us more combat ready.” The DoD launched its first bug bounty, Hack the Pentagon, in May 2016, which was considered one of the first major successes for the then-newly minted Defense Digital Service. Since then the DoD has held bug bounties for the Army, the Air Force, the Air Force again and the Defense Travel System. The combined programs resulted in over 600 resolved vulnerabilities with approximately $500,000 awarded to the ethical hackers participating in the program. “Information security is a challenge unlike any other for our military. Our adversaries are working to exploit networks and cripple our operations without ever firing a weapon," said Chris Lynch, the director of the Defense Digital Service. "Sometimes, the best line of defense is a skilled hacker working together with our men and women in uniform to better secure our systems. We're excited to see Hack the Pentagon continue to build momentum and bring together nerds who want to make a difference and help protect our nation.” Hack the Marine Corps was launched with HackerOne, which partners with the hacker community to help businesses and government conduct bug bounties, and kicked off with a live hacking event coinciding with the Black Hat USA, DefCon and BSides conferences in Las Vegas. The live hack resulted in 75 unique vulnerability reports and more than $80,000 in awards. “Success in cybersecurity is about harnessing human ingenuity,” said Marten Mickos, CEO at HackerOne. “There is no tool, scanner or software that detects critical security vulnerabilities faster or more completely than hackers. The Marine Corps, one of the most secure organizations in the world, is the latest government agency to benefit from diverse hacker perspectives to protect Americans on and off the battlefield.” The bug bounty program ends Aug. 26. https://www.fifthdomain.com/dod/marine-corps/2018/08/13/pentagon-invites-researchers-to-hack-the-marine-corps/

Toutes les nouvelles